Understanding Information Security Investigations Essay

PAGES
2
WORDS
642
Cite

Lessons From Target Data Breach There are several lessons learnt from this case. First, I have learnt that the experience of Target on its data breach continues to jeopardize the confidentiality of stored information and the market value of the firm. Therefore, the company deserves to invest much attention, especially in research. Worry of disclosure of credit card information, private details, and other IDs is often the reason why customers leave companies. After identification of breach, Target Company is compelled to pay court costs, charges and has to get into enhancing its data security. The traders lose assurance in the company and the eventual fall in market value. Many studies have been performed to assess the speculation as further explored in this study (Bayuk, 2010). The primary objective of this document is to evaluate the chance of forecast of a Target data violation and assess its effect on industry value based on the outcomes of recent reports and research of representative cases (Grove, 2010).

Domain

Secondly,...

...

While providing a high-level of security to protect the data while also protecting the owner of the data can be challenging, it is worth the cost. This study explores relevant lessons acquired from Target data breach (Peitz & Waldfogel, 2012).
Research problem

Interestingly, nearly all the conducted studies contain the same concept that present Target data breaches have more serious effect than the historical ones. Although the real outcomes of research are not exactly the same, there is a damaging effect of the company's data breaches. Third, I have also learnt that the fall in market value happens once the disclosure of information is violated. This document is only the preliminary attempt to lay the fundamentals for the following research targeted on lessons learnt from the incident. Latest reports of…

Sources Used in Documents:

References

Bayuk, J.L. (2010). CyberForensics: Understanding information security investigations. New York: Humana Press.

Grove, R.F. (2010). Web-based application development. Sudbury, Mass: Jones and Bartlett Publishers.

Peitz, M., & Waldfogel, J. (2012). The Oxford handbook of the digital economy. New York: Oxford University Press.

Infosecurity 2008 threat analysis: Your one-stop reference containing the most read topics in the infosecurity security library. (2008). Burlington, Mass: Syngress


Cite this Document:

"Understanding Information Security Investigations" (2014, March 19) Retrieved April 16, 2024, from
https://www.paperdue.com/essay/understanding-information-security-investigations-185465

"Understanding Information Security Investigations" 19 March 2014. Web.16 April. 2024. <
https://www.paperdue.com/essay/understanding-information-security-investigations-185465>

"Understanding Information Security Investigations", 19 March 2014, Accessed.16 April. 2024,
https://www.paperdue.com/essay/understanding-information-security-investigations-185465

Related Documents

Federal Information Security Management Act (FISMA) The Federal Information Security Management Act places emphasis on the importance of training and awareness program and states under section 3544 (b).(4).(A), (B) that "security awareness training to inform personnel, including contractors and other users of information systems that support the operations and assets of the agency of- information security risks associated with their activities; and their responsibilities in complying with agency policies and procedures

Information Security
PAGES 8 WORDS 2352

Security An institution of higher learning is one of the most vulnerable places to cyber-attacks available to hackers due to the number of units operating, lackadaisical security measures and the ability of hackers to hide in plain sight. The fact that these are vulnerable systems and individuals has made it a top priority of most institutions to ensure that the people who attend the school at least have a policy

Information Security
PAGES 10 WORDS 3704

Security A broad definition of information security is given in ISO/IEC 17799 (2000) standard as: "The preservation of confidentiality (ensuring that information is accessible only to those authorized to have access), integrity (safeguarding the accuracy and completeness of information and processing methods), and availability (ensuring that authorized users have access to information and associated assets when required" (ISO/IEC 17799, 2000, p. viii). Prior to the computer and internet security emerged as we

goals of this study are to reveal some of the common and prevailing cyber security threats. Here we plan to explore the risk that is most difficult to defend: social engineering. We seek answers to the human elements and characteristics that contribute to the frauds and how they themselves unwittingly give out information that eventually leads to difficult situations. There are many ways in which the attackers 'phish' their

Information Security Strategy The world of information technology (IT) has evolved tremendously in the last few decades. Today, IT systems permeate virtually every aspect of work in the organizational setting – from strategic planning functions to administrative and operational functions such as human resource management, payroll management, project management, procurement, customer relationship management, and financial management. These systems have enabled organizations undertake a wide variety of tasks with far greater ease,

Internal Control for Information Security: Annotated Bibliography Making the case for Network Security. (2012, Apr 19). Retrieved from Wikibon Blog: http://wikibon.org/blog/making-the-case-for-network-security/ This author addresses the central concerns regarding information security in the modern business world using broad strokes to make the importance of network security as a key business operation readily apparent to the reader. As the article is addressed primarily on business managers and other practically interested personnel, the language is